Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
Computer Security Threat Monitoring and Surveillance
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
1.3 Summary<br />
In computer installations in general, security audit trails, if taken,<br />
are rarely complete <strong>and</strong> almost never geared to the needs of the security<br />
officers whose responsibility it is to protect ADP assets. The balance<br />
of this report outlines the considerations <strong>and</strong> general design of a sys<br />
tem which prOvides an initial set of tools to computer system security<br />
officers for use in their jobs. The discussion does not suggest the<br />
elimination of any existing security audit data collection <strong>and</strong> distri<br />
bution. Rather it suggests augmenting any such schemes with infor<br />
mation for the security personnel directly involved.